Sponsored by Hudson Rock – Use Hudson Rock's free cybercrime intelligence tools to learn how Infostealer infections are leading to ransomware attacks
| Discovery | RMM Tools | Defense Evasion | Credential Theft | OffSec | Networking | LOLBAS | Exfiltration |
|---|---|---|---|---|---|---|---|
|
Everything.exe
|
|
|
|
|
|
|
MEGA
WinSCP
|
No vulnerabilities exploited available.
| Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Impact |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Develop Capabilities | Exploit Public-Facing Application | Command and Scripting Interpreter | Create Account | Exploitation for Privilege Escalation | Masquerading | OS Credential Dumping | Network Service Discovery | Remote Services: Remote Desktop Protocol | Automated Collection | Exfiltration Over Alternative Protocol | Application Layer Protocol | Data Encrypted for Impact |
| Valid Accounts | Software Deployment Tools | Boot or Logon Autostart Execution | System Binary Proxy Execution | OS Credential Dumping: LSASS Memory | Process Discovery | Remote Services: SMB/Windows Admin Shares | Archive Collected Data | Exfiltration Over Web Service: Exfiltration to Cloud Storage | Encrypted Channel | |||
| Brute Force | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder | Obfuscated Files or Information | Unsecured Credentials | System Information Discovery | Windows Management Instrumentation | Archive Collected Data: Archive via Utility | Exfiltration Over C2 Channel | |||||
| Phishing | Scheduled Task/Job | Indicator Removal | File and Directory Discovery |
No YARA rules available.